Advertisement

Journal of Computer Science and Technology

, Volume 26, Issue 4, pp 744–750 | Cite as

Impossible Differential Attacks on 13-Round CLEFIA-128

Short Paper

Abstract

CLEFIA, a new 128-bit block cipher proposed by Sony Corporation, is increasingly attracting cryptanalysts’ attention. In this paper, we present two new impossible differential attacks on 13 rounds of CLEFIA-128. The proposed attacks utilize a variety of previously known techniques, in particular the hash table technique and redundancy in the key schedule of this block cipher. The first attack does not consider the whitening layers of CLEFIA, requires 2109.5 chosen plaintexts, and has a running time equivalent to about 2112.9 encryptions. The second attack preserves the whitening layers, requires 2117.8 chosen plaintexts, and has a total time complexity equivalent to about 2121.2 encryptions.

Keywords

block cipher cryptanalysis impossible differential CLEFIA 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Further Reading

  1. 1.
    Shirai T, Shibutani K. On feistel structures using a diffusion switching mechanism. In Proc. FSE 2006, Graz, Austria, Mar. 15–17, 2006, pp.41–56.Google Scholar
  2. 2.
    Shirai T, Shibutani K, Akishita T, Moriai S, Iwata T. The 128-bit block cipher CLEFIA (extended abstract). In Proc. FSE 2007, Luxembourg, Mar. 26–28, 2007, pp.181–195.Google Scholar
  3. 3.
    The 128 bit block cipher CLEFIA algorithm specification. Sony Corporation, http://www.sony.net/Products/cryptography/clefia
  4. 4.
    Lee C, Kim J, Sung J, Hong S, Lee S. Provable security for an RC6-like structure and a MISTY-FO-like structure against differential cryptanalysis. In Proc. ICCSA 2006, Glasgow, UK, May 8–11, 2006, pp.446–455.Google Scholar
  5. 5.
    Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 1991, 4(1): 3–72.MATHCrossRefMathSciNetGoogle Scholar
  6. 6.
    Biham E, Biryukov A, Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In Proc. EUROCRYPT 1999, Prague, Czech, May 2–6, 1999, pp.12–23.Google Scholar
  7. 7.
    The 128-bit block cipher CLEFIA security and performance evaluations. Sony Corporation, http://www.sony.net/Products/cryptography/clefia/technical/data/clefia-eval-1.0.pdf, Jun. 1, 2007.
  8. 8.
    Tsunoo Y, Tsujihara E, Shigeri M, Saito T, Suzaki T, Kubo H. Impossible differential cryptanalysis of CLEFIA. In Proc. FSE 2008, Lausanne, Switzerland, Feb. 10–13, 2008, pp.398–411.Google Scholar
  9. 9.
    Wang W, Wang X. Improved impossible differential cryptanalysis of CLEFIA. Cryptology ePrint Archive, Report 2007/466, http://eprint.iacr.org/.
  10. 10.
    Sun B, Ruilin L, Wang M, Li P, Li C. Impossible differential cryptanalysis of CLEFIA. Cryptology ePrint Archive, Report 2008/151, http://eprint.iacr.org/.
  11. 11.
    Tsujihara E, Shigeri M, Suzaki T, Kawabata T, Tsunoo Y. New impossible differentials of CLEFIA. IEICE Technical Report, ISEC2008–3 (2008–05), pp.15–22. (In Japanese)Google Scholar
  12. 12.
    Zhang W, Han J. Impossible differential analysis of reduced round CLEFIA. In Proc. Inscrypt 2008, Beijing, China, Dec. 14–17, 2008, pp.181–191.Google Scholar
  13. 13.
    Comments on the impossible differential analysis of reduced round CLEFIA presented at Inscrypt 2008. CLEFIA Design Team, Sony Corporation, Jan. 8, 2009.Google Scholar
  14. 14.
    The 128-bit block cipher CLEFIA design rationale. Sony Corporation, http://www.sony.net/Products/cryptography/clefia/technical/data/clefia-design-1.0.pdf, Jun. 1, 2007.

Copyright information

© Springer Science+Business Media, LLC & Science Press, China 2011

Authors and Affiliations

  • Hamid Mala
    • 1
  • Mohammad Dakhilalian
    • 1
  • Mohsen Shakiba
    • 1
  1. 1.Cryptography and System Security Research Laboratory, Department of Electrical and Computer EngineeringIsfahan University of TechnologyIsfahanIran

Personalised recommendations